Licensed Penetration Tester (LPT) Master Bootcamp (EC6171)
Details
Licensed Penetration Tester (LPT) - the highest level of certification from EC-Council in intrusion and penetration testing. One of the most recognized cybersecurity programs in the world.
Our training roadmap is offering the most important topics to master in the domain of ethical hacking. All of it providing knowledge that is a direct preparation to the certification exam - an exam based on a practical and complex lab scenario, with an intrusion methodology aimed at demonstrating your rigourous experience in the multiple challenges presented. 18 hours are allowed to get through nine challenges, divided in three levels of difficulty.
During the training, conceived steps will provide a comprehensive knowledge on offensive security for the ultimate objective - help you achieve your exam and become a Licensed Penetration Tester (LPT) Master!
Outline
The Certified Network Defender (CNDv2) course is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators.
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and white papers for additional learning.
Module 01: Network Attacks and Defense Strategies
Module 02: Administrative Network Security
Module 03: Technical Network Security
Module 04: Network Perimeter Security
Module 05: Endpoint Security-Windows Systems
Module 06: Endpoint Security-Linux Systems
Module 07: Endpoint Security- Mobile Devices
Module 08: Endpoint Security-IoT Devices
Module 09: Administrative Application Security
Module 10: Data Security
Module 11: Enterprise Virtual Network Security
Module 12: Enterprise Cloud Network Security
Module 13: Enterprise Wireless Network Security
Module 14: Network Traffic Monitoring and Analysis
Module 15: Network Logs Monitoring and Analysis
Module 16: Incident Response and Forensic Investigation
Module 17: Business Continuity and Disaster Recovery
Module 18: Risk Anticipation with Risk Management
Module 19: Threat Assessment with Attack Surface Analysis
Module 20: Threat Prediction with Cyber Threat Intelligence
Course 2: Certified Ethical Hacker (CEHv12) (CS6154)
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT and OT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
Course 3: Certified Penetration Tester Professional (CPENT) (CS6158)
EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
Module 01: Introduction to Penetration Testing
Module 02: Penetration Testing Scoping and Engagement
Module 03: Open Source Intelligence (OSINT)
Module 04: Social Engineering Penetration Testing
Module 05: Network Penetration Testing – External
Module 06: Network Penetration Testing– Internal
Module 07: Network Penetration Testing – Perimeter Devices
Module 08: Web Application Penetration Testing
Module 09: Wireless Penetration Testing
Module 10: IoT Penetration Testing
Module 11: OT/SCADA Penetration Testing
Module 12: Cloud Penetration Testing
Module 13: Binary Analysis and Exploitation
Module 14: Report Writing and Post Testing Actions
Our goal is to offer quality and up-to-date training courses, while following the latest trends in technology and applications. These are courses that target the real and concrete needs of our customers, ensuring that the knowledge acquired is put into practice. Additionally, many prepare our participants for certification exams with the brands we are accredited with - Microsoft, EC-Council, CompTIA, and PeopleCert.
Eccentrix has the most comprehensive offer in terms of Microsoft accredited trainings. In addition, a complete set of benefits comes with each enrollment to our trainings. Since the very beginning of our operations, Eccentrix has been a Microsoft Partner in learning following the numerous changes in the learning paths and programs, notably for certification-based courses.
EC-Council
Eccentrix has the highest level of EC-Council partnership, delivering the complete portfolio of EC-Council cybersecurity courses since 2017. With an EC-Council course comes a set of benefits that greatly help our participants get certified. EC-Council is a key vendor for Eccentrix, since we have a strong focus on cybersecurity courses and that relationships just gets better over the years. ...